The debate surrounding this topic is not unlike a heated debate between two ideologically opposed individuals discussing politics. Each feels strongly that they are “right,” and each feels equally compelled to change the other person’s viewpoint, or metaphorically beat them into submission. 1,352 more words

Since the beginning of networked computers and the first threat of hackers, the focus of cybersecurity has been to keep external threats out. Firewalls were created to filter internet traffic, antivirus software was designed to detect malicious software that made its way onto a system, and more advanced devices such as Intrusion Detection Systems (IDSs) were developed to help companies with limited security resources to detect activity that may be caused by a hacker or malware. 756 more words

A regional Queensland police officer has been charged by the Crime and Corruption Commission (CCC) for allegedly accessing and disseminating confidential information from the state’s police database. 29 more words